Behavioral task
behavioral1
Sample
1b2ddf1f5a3ff2e2db511ad3e414790ecb3535dc0c21b79bcb598992b6cfa6ff.exe
Resource
win7-20240903-en
General
-
Target
1b2ddf1f5a3ff2e2db511ad3e414790ecb3535dc0c21b79bcb598992b6cfa6ff
-
Size
172KB
-
MD5
9436084c8082e978164e88e522bcb627
-
SHA1
8f9c549cab5117723783a4163efc98a53cdcf5cf
-
SHA256
1b2ddf1f5a3ff2e2db511ad3e414790ecb3535dc0c21b79bcb598992b6cfa6ff
-
SHA512
2e74466f6fc9c4fe4a0cee895beff1944d7f96244932dbfe7cf23fbae83bb287dc9bee399da31e7b4467822bc49ca25bf5e33a195d4a62f38d4aec8cbe1d6a4d
-
SSDEEP
1536:GBtXijvZxY9AlrolYXXm3sBrh0FWCOA/PvkJjhWPN1CjZTqJWlMNtoQvt:GPX2vZxTl3XW32PCf/3kJliNgSW4tos
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b2ddf1f5a3ff2e2db511ad3e414790ecb3535dc0c21b79bcb598992b6cfa6ff
Files
-
1b2ddf1f5a3ff2e2db511ad3e414790ecb3535dc0c21b79bcb598992b6cfa6ff.exe windows:4 windows x86 arch:x86
06ab1b8a8165728e5f703dc3d6a34f35
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
GetCurrentProcess
GetSystemTime
Sleep
GetTickCount
CreateTimerQueueTimer
GetOEMCP
LoadLibraryA
RemoveDirectoryW
GetACP
GetProcAddress
advapi32
GetUserNameW
comctl32
InitCommonControls
gdi32
GetObjectA
SaveDC
CreateCompatibleDC
GetDeviceCaps
CreateSolidBrush
DeleteObject
GetStockObject
msvcrt
srand
printf
strlen
time
rand
remove
ole32
OleFlushClipboard
CreateBindCtx
IsEqualGUID
RevokeDragDrop
shlwapi
UrlIsW
user32
GetParent
LoadCursorA
GetKeyState
TranslateMessage
GetSystemMetrics
GetDesktopWindow
GetFocus
LoadBitmapA
GetSysColor
GetCursorPos
Sections
UPX0 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE